5174779 2000-06-08 11:09 /117 rader/ Postmaster
Mottagare: Bugtraq (import) <11199>
Ärende: Brev från Technical Support <support@PHOENIX.CALDERASYSTEMS.COM>
------------------------------------------------------------
Approved-By: aleph1@SECURITYFOCUS.COM
Delivered-To: bugtraq@lists.securityfocus.com
Delivered-To: bugtraq@securityfocus.com
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-ID: <20000607145235.B21778@phoenix.calderasystems.com>
Date: Wed, 7 Jun 2000 14:52:35 -0600
Reply-To: Technical Support <support@PHOENIX.CALDERASYSTEMS.COM>
Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM>
From: Technical Support <support@PHOENIX.CALDERASYSTEMS.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
Caldera Systems, Inc. Security Advisory
Subject: buffer overflow in inn
Advisory number: CSSA-2000-016.0
Issue date: 2000 June, 07
Cross reference:
______________________________________________________________________________
1. Problem Description
There is a buffer overflow in the handling of control articles in
some configurations of the InterNet News package (INN).
This lets malicious attackers tailor control message that might
give them access to the local 'news' account.
The sample configuration shipped by us does not enable that option,
and we recommend our users to disable the configuration option as
specified in the workaround below, since it is not RFC compliant
behaviour.
Fixed packages will be provided when the INN 2.2.3 bugfix release
becomes available.
2. Vulnerable Versions
System Package
-----------------------------------------------------------
OpenLinux Desktop 2.3 previous to inn-2.2.3
OpenLinux eServer 2.3 previous to inn-2.2.3
and OpenLinux eBuilder
OpenLinux eDesktop 2.4 previous to inn-2.2.3
3. Solution
Workaround:
1. If you do not use INN, simply remove the package:
rpm -e inn
2. In /etc/news/inn.conf replace the line:
verifycancels: true
by
verifycancels: false
and reload the INN configuration:
/usr/libexec/inn/bin/ctlinnd reload all 'security fix'
4. OpenLinux Desktop 2.3
Shipped sample configuration not vulnerable.
No fixed packages released, see workaround above.
5. OpenLinux eServer 2.3 and OpenLinux eBuilder for ECential 3.0
Shipped sample configuration not vulnerable.
No fixed packages released, see workaround above
6. OpenLinux eDesktop 2.4
Shipped sample configuration not vulnerable.
No fixed packages released, see workaround above.
7. References
This and other Caldera security resources are located at:
http://www.calderasystems.com/support/security/index.html
This security fix refers to Caldera's internal Problem Report 6825.
8. Disclaimer
Caldera Systems, Inc. is not responsible for the misuse of any of
the information we provide on this website and/or through our
security advisories. Our advisories are a service to our customers
intended to promote secure installation and use of Caldera
OpenLinux.
9. Acknowledgements
Caldera Systems wishes to thank Michal Zalewski for discovering
and reporting the bug, and Russ Allbery for providing further
explanations regarding standard conformance.
______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE5Pj6l18sy83A/qfwRAsNwAKCD13nrE4zfMCPeCViP4x/VFYQ0/gCfY8i7
AHTvNFJaDAypTkMbMGpBVBk=
=UEmy
-----END PGP SIGNATURE-----
(5174779) ------------------------------------------(Ombruten)